Monday, October 8, 2012

Well I started out with one thing in mind, but. . . by Teddi Moon

I began looking for articles for this post that gave some comparison information on different countries and where they were in their level of information security maturity.  I had a difficult time finding any information describing what I was looking for.  However, I did find a 'book' online that I quite enjoyed while I skimmed through it.  It is actually kind of old, 2001, but the authors, I believe were ahead of the game in getting their 'sermon' out in that year.  I mean think about it, that was 11 years ago.  As far as technology goes, things move fast.  But this book is talking about cyber-terrorism, cyber-threats, cyber-war, and all of the topics we have been discussing in this class.  I have to tell you, many people I talk to today give me a blank look and say, 'cyber - who???'  So I think these authors were pretty darn insightful for that year.  They pose the question, "Do we need a full-scale information security disaster for this subject to be given the attention it requires? "

 I like this book because it does not read like a dry textbook.  The language is professional, but engaging.  I think this book would be ideal for the general public to read to become more familiar with this topic.  It is easy to read and concepts and definitions are explained well and very understandable.  Those of us that know people that are a little interested in the topic and want to learn more could really find the book enjoyable as well as informative, (and likely disturbing.)  It could be a good book to have in the break room for employees to read a paragraph or two while eating lunch.  Maybe it is just my inner geek, but I think the book draws you in and holds your interest.  Even though I have studied these topics and read texts on the same topics, I still wanted to keep reading this book.  I really like the name, too.  Information Insecurity, A survival guide to the uncharted territories of cyber-threats and cyber-security by Eduardo Gelbstein and Ahmad Kamal.  It can be found at this link:  http://www.itu.int/wsis/docs/background/themes/security/information_insecurity_2ed.pdf

No comments:

Post a Comment